1of 8

Learn Hacking Windows 10 Using Metasploit From Scratch

Hack Windows Like a Pro, Secure It Like an Expert, & Detect the Hackers

Description

In this beginner- and professional-friendly course, you’ll learn how black hat hackers hack Windows using advanced techniques, while improving your knowledge on how to analyze and secure Windows, and detect a hacker’s identity. Across the example-based course, you’ll get hands-on instruction in white hat hacking.

Gain full access over a target OS & learn how to interact w/ it using Meterpreter command line

Perform various attacks over WAN network

Detect & protect from all of the attacks discussed

Specs

Details & Requirements

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

Compatibility

Internet required

Instructor

Saad Sarraj has been an Ethical Hacker since 2012. He founded the website iSecurityPro and has been educating people in Linux and Windows security tips through his YouTube channel over that time. He is always focused on the practical side in his teaching, and the theory behind every attack.

Access

Lifetime

Content

12.5 hours

Lessons

85

Hack People, Systems and Mobile Devices

Learn Advanced Social Engineering Techniques to Crack Mobile Devices

Description

To completely understand computer security, it’s vital to think outside the box. It’s not just about firewalls, Intrusion Prevention Systems, or antivirus. It’s also about tricking people into doing whatever a hacker wishes. A secure system, therefore, is also about informed people. This training is based on a practical approach of day-by-day situations contained labs based on real environments. The aim is to help you learn ethical hacking techniques and methodology used in penetration systems to better protect yourself and those around you.

Instructor

Gabriel Avramescu is a Senior Information Security Consultant and IT Trainer. He works on an Internet security team focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.

Access

Lifetime

Content

8 hours

Lessons

64

Web Application Penetration Testing Professional: WAPTP v3.1

Attack Web Apps with the Latest Professional Tools & Tricks

Description

WAPTP v3.1 is a highly practical and hands-on training for web application penetration testing that covers the OWASP top 10 vulnerabilities. Starting with various terminologies of web technologies, you’ll build towards mapping an application for insecurities, and understanding how to identify and mitigate threats.

Access 64 lectures & 8 hours of content 24/7

Map an app for insecurities using various tools & tricks, including Burp Suite

Find & hunt each vulnerability through the points developers use to secure the web app at the time of development

Specs

Details & Requirements

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

Compatibility

Internet required

Instructor

Atul Tiwari has more than 7 years of working experience in the information security field. He has trained more than 3,000 students in information security and penetration testing. With his expertise in web application penetration testing, Atul has performed penetration tests, security audits, and security analysis for private enterprise, governments, and security agencies to assist with cyber threats.

Access

Lifetime

Content

7 hours

Lessons

118

From Zero to Hero in Web, Network and WiFi Hacking

Learn Basic to Advanced Web, Network, & WiFi Hacking

Description

This course aims to teach you in-depth WiFi hacking and security. Upon completion, you’ll be confident in breaking all types of WiFi encryption methods. Starting as a complete beginner with little to no knowledge of WiFi security and Kali Linux, you’ll learn the most important elements of WiFi hacking so you can begin applying them to a career in ethical hacking.

Instructor

LearnPentest is a group of penetration testers and ethical hackers with an extensive background in web application security, web and software development, network administration and exploit development. They have over 7 years of professional experience in the cyber security domain. Their instructors hold some of the most valuable certifications in the cyber security domain including: OSCP, LPT, C|EH, CISSP, OSCE.

Access

Lifetime

Content

8.5 hours

Lessons

80

Ethical Hacking Using Kali Linux From A to Z

Discover the Power of Kali Linux, One of the Most Popular Ethical Hacking Tools

Description

To break into the world of professional penetration testing, you’ll need to be an ace with Kali Linux. This course will introduce you to the latest ethical hacking tools and techniques with Kali Linux, using a testing lab for practicing different types of attacks. Across the course, you’ll simulate an entire penetration test from beginning to end, giving you verifiable hands-on experience.

Access 80 lectures & 8.5 hours of content 24/7

Get comfortable w/ Kali Linux & learn the penetration testing phases

Manage Kali Linux HTTP & SSH services

Discover essential tools like Netcat & WireShark

Gather passive & active information

Explore how to perform & defend against a variety of attacks

Receive monthly virtual machines as a hacking challenge

Specs

Details & Requirements

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

Compatibility

Internet required

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

Learn Website Hacking and Penetration Testing From Scratch

Learn How to Hack Sites Like A Black Hat Hacker & How to Protect Them Like A White Hat Hacker

Description

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. As you gain a complex understanding of websites, you will then learn how you can exploit them to carry out a number of powerful cyber attacks. You’ll track from a beginning to advanced level and by the time you finish you’ll be able to launch attacks and test the security of websites and apps the same way that black hat hackers would, and be able to fix these vulnerabilities.

Access 93 lectures & 9 hours of content 24/7

Learn how to gather information about your target site like discovering the DNS server used & subdomains

Discover, exploit, & fix a number of vulnerabilities like file upload, code execution, SQL injection, XSS, & much more

Understand what you can do w/ the access gained from vulnerabilities

Explore the basic exploitation of attacks & the advanced methods to enhance them

Learn how & why vulnerabilities are exploitable, how to fix them, & the right practices to avoid them

Specs

Details & Requirements

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

Compatibility

Internet required

Instructor

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Access

Lifetime

Content

12.5 hours

Lessons

106

Cyber Security Volume II: Network Security

Discuss Network Security, Firewalls, & Learn the Best Password Managers On the Market

Description

Over this course you’ll learn network hacking techniques and vulnerability scanning to discover security risks across an entire network, learning skills for which companies are willing to pay top dollar. Whether you want to protect your own network or protect corporate networks professionally, this course will get you up to speed.

Instructor

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK’s mobile banking and payment solutions helping secure to date over £71Bn in transactions.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan’s qualifications and education include:

BSc. (Hons) Computing ‘Networks & Communication’ 1st Class Honors

SCF : SABSA Charted Architect Foundation

CISSP : Certified Information Systems Security Professional

CISA : Certified Information Systems Auditor

CISM : Certified Information Security Manager

ISO 27001 Certified ISMS Lead Auditor

CEH : Certified Ethical Hacker

OSCP : Offensive Security Certified Professional

Access

Lifetime

Content

2 hours

Lessons

14

Ethical Hacking for Beginners

Description

This course provides a good starting point from which to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment. You’ll begin with an introduction to the best tools around before diving into basic hacking technique, and ultimately going into real-life scenarios to get a hang of how hackers think.

Access 14 lectures & 2 hours of content 24/7

Discuss a basic introduction to reconnaissance

Get hands-on experience working w/ Metasploit & testing the effectiveness of different defenses

Learn about sniffing & how effective Man-in-the-Middle attacks can be

Go through a coffee shop scenario to further your understanding

Understand how hackers use networks to gain access to different systems

Specs

Details & Requirements

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

Compatibility

Internet required

Instructor

Gary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome’s computer security and forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats.